http://www.DellSoftware.com/AD-Defender
In part three of this five part series, learn how Defender by Dell Software ensures a smooth deployment of your two-factor authentication solution.

[MUSIC PLAYING] Hi. I'm Bill Evans, a member of the identity and access management team at Dell Software. This is part three of a five part series on the questions you need to ask before purchasing a two-factor authentication solution. If you haven't seen the other parts yet, don't worry. You don't need to watch them in order.
So today, we're going to discuss deployment, because ensuring a swift, smooth deployment is vital to the success of any IT project. Any hiccups can cause both admins and user aversion, not only for the deployment, but for ongoing use. The most important question you need to ask around deployment is how tokens will be requested and assigned, a critical success factor and one of the most time consuming tasks.
In regards to hardware tokens, how will you manage the shipment of the assigned tokens to the appropriate user? And for software tokens with a myriad of mobile platforms and use, how will you know what type of software token to assign each user? Now that we've talked about what you need to ask vendors when it comes to deploying their solution, let's discuss how Dell Software's Defender answers the question.
Defender enables users to securely request and/or register a hard or soft token based upon pre-defined administrator policy. The user can then assign that token to their account through a unique secure mechanism, removing the entire administrative burden and associated costs of conventional manual token assignment. There are no headaches trying to make sure that the token you assign to a user gets shipped to the exact user. Instead, just ship a user an unassigned token and let them assign it to themselves. And no need to know what type of mobile device the user would like to run a software token on. Let them self-select based on the options you have pre-defined.
Well, that wraps it up for our question on deployment. Remember, the devil is in the details. And not all two-factor authentication solutions are the same. So check out the Videos tab on software.dell.com/defender to see the next part of our video series on the questions you need to ask before purchasing a two-factor solution.
[MUSIC PLAYING]